every one of the satellite was built in a proprietary environment. it was protected. these are different challenges we face and they face. those adversaries have by huge access to a wide range of capabilities, and they can leverage and repackage publicly available tools. some of our students are showing some of the tools that are available but they have access to, but publicly available tool kits repackaged can do a great deal of harm, and they share these tool kits. they have an underground community better than most. these attackers will dedicate resources to finding new exploit its to things -- new exploit its to things the government has been able to detect and deter. the reality is our job is to anticipate, but when you cannot anticipate, you have to figure out how can i get ahead of it the next time? how do i get beyond whether it is signature-based, tool-based, spear-fishing, a targeted attack, and if i cannot get beyond it, how do i defend against sin? how do i make my network robust enough to defend it from someone who wants to do it harm? they use a lot of i